Results 41 to 50 of about 12,935 (239)
Stream cipher based on quasigroup string transformations in $Z_p^*$
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core +1 more source
From Waste to Value: Conversion of Calcium Sulfate to Vaterite via Carbon Capture and Storage
This study introduces a new concept for carbon management that relies on the carbonation of industrial gypsum waste and yields phase‐pure vaterite at ambient conditions without any additives. The obtained vaterite is further shown to be a reactive material that develops compressive strength in aqueous suspensions like conventional cements.
Carlos Pimentel +4 more
wiley +1 more source
Shape‐Morphing Nanoengineered Hydrogel Ribbons as Hemostats
This study introduces a self‐assembling, shape‐morphing nanoengineered hydrogel ribbon system that rapidly forms porous aggregates in situ for efficient hemostasis in trauma and surgical applications. Abstract Rapid and effective hemorrhage control remains a major challenge in trauma and surgical care, particularly for complex or noncompressible wounds.
Ryan Davis Jr +9 more
wiley +1 more source
Introducing Pure Calcium Orthophosphate Gels and Aerogels
The synthesis of calcium phosphate‐based gels and aerogels is reported, which exhibit highly porous structures built up of networks of nanoparticles. In case of amorphous aerogels, this leads to yet unmatched specific BET surface areas, making these materials especially interesting for biomedical applications.
Oliver Jeske +4 more
wiley +1 more source
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Towards Low Energy Stream Ciphers
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags. At Asiacrypt 2015, Banik et al.
Banik, Subhadeep +7 more
openaire +6 more sources
In this study, the preparation techniques for silver‐based gas diffusion electrodes used for the electrochemical reduction of carbon dioxide (eCO2R) are systematically reviewed and compared with respect to their scalability. In addition, physics‐based and data‐driven modeling approaches are discussed, and a perspective is given on how modeling can aid ...
Simon Emken +6 more
wiley +1 more source
Liquid crystalline inverted lipid phases and reverse micelles are self‐assembled lipid nanostructures that enhance the solubility, stability, and delivery of diverse therapeutics. This review integrates their physicochemical principles, formulation strategies, drug loading mechanisms, and biomedical applications, highlighting their growing ...
Numan Eczacioglu +3 more
wiley +1 more source
Role of Histidine‐Containing Peptoids in Accelerating the Kinetics of Calcite Growth
Amphiphilic histidine‐containing peptoids mimic carbonic anhydrase (CA) to accelerate calcite step growth. In the presence of Zn2+, they promote the deprotonation of HCO3−, the desolvation of Ca2+, and the reorganization of interfacial hydration layers, thereby reducing the activation barrier for calcite growth.
Mingyi Zhang +5 more
wiley +1 more source

